关注
Ji Won Yoon
标题
引用次数
引用次数
年份
An image encryption scheme with a pseudorandom permutation based on chaotic maps
JW Yoon, H Kim
Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010
2032010
Cityride: a predictive bike sharing journey advisor
JW Yoon, F Pinelli, F Calabrese
2012 IEEE 13th international conference on mobile data management, 306-311, 2012
1552012
Nanopipette delivery of individual molecules to cellular compartments for single-molecule fluorescence tracking
A Bruckbauer, P James, D Zhou, JW Yoon, D Excell, Y Korchev, R Jones, ...
Biophysical journal 93 (9), 3120-3131, 2007
1332007
Predicting arrival times of buses using real-time GPS measurements
M Sinn, JW Yoon, F Calabrese, E Bouillet
2012 15th International IEEE Conference on Intelligent Transportation …, 2012
792012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
772010
DySCo: quantitating associations of membrane proteins using two-color single-molecule tracking
PD Dunne, RA Fernandes, J McColl, JW Yoon, JR James, SJ Davis, ...
Biophysical Journal 97 (4), L5-L7, 2009
732009
Bayesian inference for improved single molecule fluorescence tracking
JW Yoon, A Bruckbauer, WJ Fitzgerald, D Klenerman
Biophysical journal 94 (12), 4932-4947, 2008
592008
Estimation of arrival times at transit stops
EP Bouillet, F Calabrese, F Pinelli, M Sinn, JW Yoon
US Patent 9,183,741, 2015
562015
Deterministic and statistical methods for reconstructing multidimensional NMR spectra
JW Yoon, S Godsill, E Kupče, R Freeman
Magnetic Resonance in Chemistry 44 (3), 197-209, 2006
542006
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling
JW Yoon, SJ Roberts, M Dyson, JQ Gan
Neural Networks 22 (9), 1286-1294, 2009
472009
A new countermeasure against brute-force attacks that use high performance computers for big data analysis
HJ Jo, JW Yoon
International Journal of Distributed Sensor Networks 11 (6), 406915, 2015
282015
Visual honey encryption: Application to steganography
JW Yoon, H Kim, HJ Jo, H Lee, K Lee
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015
272015
Efficient model selection for probabilistic K nearest neighbour classification
JW Yoon, N Friel
Neurocomputing 149, 1098-1108, 2015
262015
Network analysis of temporal trends in scholarly research productivity
H Kim, JW Yoon, J Crowcroft
Journal of Informetrics 6 (1), 97-110, 2012
222012
The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information
MY Hong, JW Yoon
Plos one 17 (2), e0259869, 2022
212022
Various threat models to circumvent air-gapped systems for preventing network attack
E Lee, H Kim, JW Yoon
Information Security Applications: 16th International Workshop, WISA 2015 …, 2016
212016
Voice presentation attack detection through text-converted voice command analysis
IY Kwak, JH Huh, ST Han, I Kim, J Yoon
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
202019
ResMax: Detecting voice spoofing attacks with residual network and max feature map
IY Kwak, S Kwag, J Lee, JH Huh, CH Lee, Y Jeon, J Hwang, JW Yoon
2020 25th International Conference on Pattern Recognition (ICPR), 4837-4844, 2021
192021
Classification of home appliance by using Probabilistic KNN with sensor data
SJ Kang, JW Yoon
2016 Asia-Pacific Signal and Information Processing Association Annual …, 2016
182016
Honey chatting: A novel instant messaging system robust to eavesdropping over communication
JI Kim, JW Yoon
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
172016
系统目前无法执行此操作,请稍后再试。
文章 1–20